Beruflich Dokumente
Kultur Dokumente
Cyber Warfare
1. By June 2006, 180,292 unique computer viruses had been identified. 2. There are approximately 150-250 new viruses identified every month
challenge
21 January 2003 Two years jail for UK virus writer who infected 27,000 PCs Simon Vallor, the twenty-two year old web designer from North Wales who, in December 2002, pleaded guilty to writing and distributing three computer viruses, was today sentenced at Southwark Crown Court, London to a two year custodial sentence. His viruses - Gokar, Redesi and Admirer were proven to have infected 27,000 PCs in 42 countries. "Vallor's actions were comparable to those of a vandal gaining illegal entry to businesses across the world and then interfering with thousands of their PCs. "Around 800 new viruses are cropping up each month this level of activity requires a lot of virus writers. Perhaps Vallor's sentence will focus some minds and make virus writers think twice before unleashing their malicious code."
Spam: unsolicited and/or undesired bulk e-mail messages, often selling a product (See also SPIM targeting of instant messaging services)
Phishing
Phishing is a technique used by strangers to "fish" for information about you, information that you would not normally disclose to a stranger, such as your bank account number, PIN, and other personal identifiers such as your National Insurance number. These messages often contain company/bank logos that look legitimate and use flowery or legalistic language about improving security by confirming your identity details.
Phishing example
Threats: MALWARE
Malware is Malicious Software - deliberately created and specifically designed to damage, disrupt or destroy network services, computer data and software. There are several types...
Malware Types
Worms: Programs that are capable of independently propagating throughout a computer network. They replicate fast and consume large amounts of the host computers memory.
Malware Types
Trojan Horses:
Programs that contain hidden functionality that can harm the host computer and the data it contains. THs are not automatic replicators - computer users inadvertently set them off.
Malware Types
Software Bombs:
Time Bombs - triggered by a specific time/date Logic Bombs - triggered by a specific event Both are introduced some time before and will damage the host system
Victims of Vandalism
A final word:
Treat your Treat your password like you treat your password like you treat your toothbrush. Never give it to anyone toothbrush. else to use, and it to Never give change it every few monthsanyone else to . use, and change it every few months.
Thank you